A Hybrid Cloud Approach for Secure
Authorized Deduplication
© Copyright 1croreprojects., 2018. All rights reserved.
DOTNET
WHY ? WHAT? WHERE?
© Copyrights 2018 1croreprojects. All Rights Reserved
Design Features of DOT NET Framework
 Interoperability.
 Common Language Runtime engine (CLR)
 Language independence.
 Base Class Library.
 Simplified deployment.
 Security.
 Portability.
© Copyrights 2018 1croreprojects
© Copyrights 1croreprojects 2018
 Data deduplication is one of important data compression techniques
for eliminating duplicate copies of repeating data, and has been
widely used in cloud storage to reduce the amount of storage space
and save bandwidth. To protect the confidentiality of sensitive data
while supporting deduplication, the convergent encryption technique
has been proposed to encrypt the data before outsourcing. To better
protect data security, this paper makes the first attempt to formally
address the problem of authorized data deduplication. Different
from traditional deduplication systems, the differential privileges of
users are further considered in duplicate check besides the data
itself. We also present several new deduplication constructions
supporting authorized duplicate check in a hybrid cloud
architecture. Security analysis demonstrates that our scheme is
secure in terms of the definitions specified in the proposed security
model.
© Copyrights 2018 1Croreprojects
 Data deduplication systems, the private cloud
is involved as a proxy to allow data
owner/users to securely perform duplicate
check with differential privileges.
 Such architecture is practical and has
attracted much attention from researchers.
 The data owners only outsource their data
storage by utilizing public cloud while the
data operation is managed in private cloud.
© Copyrights 2018 1Croreprojects
 In this paper, we enhance our system in security.
Specifically, we present an advanced scheme to
support stronger security by encrypting the file
with differential privilege keys. In this way, the
users without corresponding privileges cannot
perform the duplicate check. Furthermore, such
unauthorized users cannot decrypt the cipher
text even collude with the S-CSP. Security
analysis demonstrates that our system is secure
in terms of the definitions specified in the
proposed security model.
© Copyrights 2018 1Croreprojects
 Cloud Service Provider
 Data Users Module
 Private Cloud Module
 Secure Deduplication System
© Copyrights 2018 1Croreprojects
Cloud Service Provider
 In this module, we develop Cloud Service
Provider module. This is an entity that provides a
data storage service in public cloud. The S-CSP
provides the data outsourcing service and stores
data on behalf of the users.To reduce the storage
cost, the S-CSP eliminates the storage of
redundant data via deduplication and keeps only
unique data. In this paper, we assume that S-CSP
is always online and has abundant storage
capacity and computation power.
© Copyrights 2018 1Croreprojects
 A user is an entity that wants to outsource data
storage to the S-CSP and access the data later. In
a storage system supporting deduplication, the
user only uploads unique data but does not
upload any duplicate data to save the upload
bandwidth, which may be owned by the same
user or different users. In the authorized
deduplication system, each user is issued a set of
privileges in the setup of the system. Each file is
protected with the convergent encryption key and
privilege keys to realize the authorized
deduplication with differential privileges.
© Copyrights 2018 1Croreprojects
 We consider several types of privacy we need protect,
that is, i) unforgeability of duplicate-check token:
There are two types of adversaries, that is, external
adversary and internal adversary.
 As shown below, the external adversary can be
viewed as an internal adversary without any privilege.
 If a user has privilege p, it requires that the adversary
cannot forge and output a valid duplicate token with
any other privilege p′ on any file F, where p does not
match p′. Furthermore, it also requires that if the
adversary does not make a request of token with its
own privilege from private cloud server, it cannot
forge and output a valid duplicate token with p on
any F that has been queried.
© Copyrights 2018 1Croreprojects
 Compared with the traditional deduplication architecture
in cloud computing, this is a new entity introduced for
facilitating user’s secure usage of cloud service.
 Specifically, since the computing resources at data
user/owner side are restricted and the public cloud is not
fully trusted in practice, private cloud is able to provide
data user/owner with an execution environment and
infrastructure working as an interface between user and
the public cloud.
 The private keys for the privileges are managed by the
private cloud, who answers the file token requests from
the users. The interface offered by the private cloud allows
user to submit files and queries to be securely stored and
computed respectively.
 Secure Deduplication System
© Copyrights 2018 1Croreprojects
© Copyrights 2018 1Croreprojects

1 croreprojects dotnet ppt

  • 1.
    A Hybrid CloudApproach for Secure Authorized Deduplication © Copyright 1croreprojects., 2018. All rights reserved.
  • 2.
    DOTNET WHY ? WHAT?WHERE? © Copyrights 2018 1croreprojects. All Rights Reserved
  • 3.
    Design Features ofDOT NET Framework  Interoperability.  Common Language Runtime engine (CLR)  Language independence.  Base Class Library.  Simplified deployment.  Security.  Portability. © Copyrights 2018 1croreprojects
  • 4.
  • 5.
     Data deduplicationis one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this paper makes the first attempt to formally address the problem of authorized data deduplication. Different from traditional deduplication systems, the differential privileges of users are further considered in duplicate check besides the data itself. We also present several new deduplication constructions supporting authorized duplicate check in a hybrid cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. © Copyrights 2018 1Croreprojects
  • 6.
     Data deduplicationsystems, the private cloud is involved as a proxy to allow data owner/users to securely perform duplicate check with differential privileges.  Such architecture is practical and has attracted much attention from researchers.  The data owners only outsource their data storage by utilizing public cloud while the data operation is managed in private cloud. © Copyrights 2018 1Croreprojects
  • 7.
     In thispaper, we enhance our system in security. Specifically, we present an advanced scheme to support stronger security by encrypting the file with differential privilege keys. In this way, the users without corresponding privileges cannot perform the duplicate check. Furthermore, such unauthorized users cannot decrypt the cipher text even collude with the S-CSP. Security analysis demonstrates that our system is secure in terms of the definitions specified in the proposed security model. © Copyrights 2018 1Croreprojects
  • 8.
     Cloud ServiceProvider  Data Users Module  Private Cloud Module  Secure Deduplication System © Copyrights 2018 1Croreprojects
  • 9.
    Cloud Service Provider In this module, we develop Cloud Service Provider module. This is an entity that provides a data storage service in public cloud. The S-CSP provides the data outsourcing service and stores data on behalf of the users.To reduce the storage cost, the S-CSP eliminates the storage of redundant data via deduplication and keeps only unique data. In this paper, we assume that S-CSP is always online and has abundant storage capacity and computation power. © Copyrights 2018 1Croreprojects
  • 10.
     A useris an entity that wants to outsource data storage to the S-CSP and access the data later. In a storage system supporting deduplication, the user only uploads unique data but does not upload any duplicate data to save the upload bandwidth, which may be owned by the same user or different users. In the authorized deduplication system, each user is issued a set of privileges in the setup of the system. Each file is protected with the convergent encryption key and privilege keys to realize the authorized deduplication with differential privileges. © Copyrights 2018 1Croreprojects
  • 11.
     We considerseveral types of privacy we need protect, that is, i) unforgeability of duplicate-check token: There are two types of adversaries, that is, external adversary and internal adversary.  As shown below, the external adversary can be viewed as an internal adversary without any privilege.  If a user has privilege p, it requires that the adversary cannot forge and output a valid duplicate token with any other privilege p′ on any file F, where p does not match p′. Furthermore, it also requires that if the adversary does not make a request of token with its own privilege from private cloud server, it cannot forge and output a valid duplicate token with p on any F that has been queried. © Copyrights 2018 1Croreprojects
  • 12.
     Compared withthe traditional deduplication architecture in cloud computing, this is a new entity introduced for facilitating user’s secure usage of cloud service.  Specifically, since the computing resources at data user/owner side are restricted and the public cloud is not fully trusted in practice, private cloud is able to provide data user/owner with an execution environment and infrastructure working as an interface between user and the public cloud.  The private keys for the privileges are managed by the private cloud, who answers the file token requests from the users. The interface offered by the private cloud allows user to submit files and queries to be securely stored and computed respectively.  Secure Deduplication System © Copyrights 2018 1Croreprojects
  • 13.
    © Copyrights 20181Croreprojects